Experts predict extensive attacks of Windows zero-day

Security organizations today raised Internet threat levels to warn users that they expect widespread attacks using exploits of a just-acknowledged critical bug in all versions of Windows.

The Internet Storm Center (ISC) pushed its Infocon threat indicator to "Yellow," a rare move, while Symantec also bumped up the status of its ThreatCon barometer to "Elevated."

Today's shift by ISC was the first Yellow since July 2009, when the group alerted users of a vulnerability in Office Web Components , a set of ActiveX controls for publishing Microsoft Office content to the Web and for displaying that content in Internet Explorer (IE).

"The proof-of-concept exploit is publicly available, and the issue is not easy to fix until Microsoft issues a patch," said Lenny Zeltser, an ISC security analyst, as he explained the higher threat level . "Although we have not observed the vulnerability exploited beyond the original targeted attacks, we believe wide-scale exploitation is only a matter of time."

Last Friday, Microsoft confirmed that attackers can use a malicious shortcut file, identified by the ".lnk" extension, to automatically execute their malware by getting users to view the contents of a folder containing such a shortcut. Malware can also automatically execute on many systems when a USB drive is plugged into the PC.

All versions of Windows, including the just-released beta of Windows 7 Service Pack 1 (SP1), as well as the recently retired Windows XP SP2 and Windows 2000, contain the bug.

Many of the attacks spotted so far have been aimed at major manufacturing and utility companies. Last week, Siemens alerted customers of its Simatic WinCC management software that attacks using the vulnerability were targeting computers used to manage large-scale industrial control systems, often called SCADA, for "supervisory control and data acquisition."

Symantec also boosted its ThreatCon indicator from the usual Level 1 to Level 2, dubbed "Elevated." Like the ISC, Symantec said it made the move because of the advisory Microsoft issued Friday and the expectation of increased attacks.

"The Symantec DeepSight Team expects this issue to be incorporated by attackers to carry out remote drive-by download attacks in the wild," said Symantec on its ThreatCon page .

HD Moore, the chief security officer of Rapid7 and the creator of the well-known Metasploit hacking toolkit, said that it was unlikely the vulnerability would be used in classic drive-by attacks, as Symantec predicted. "The vulnerability is serious, but it's not as bad as a drive-by," Moore said, talking about the type of attacks that compromise computers when their users simply browse to a malicious site.

Companies will remain the most lucrative targets for exploits of the Windows shortcut bug, Moore bet, while consumers will likely be relatively safe. One reason: Newer browsers , such as Internet Explorer 8 (IE8), Firefox and Chrome, will shield consumers. IE6, however, which is still widely used in some businesses, does not.

Moore said he was already working on an exploit module for Metasploit, but said it would take time "to make a module really useful" for penetration testing. He's currently exploring a pair of ways to weaponize the publicly-posted proof-of-concept code.

Although Microsoft has confirmed the flaw and offered up workarounds -- including one that requires users to cripple shortcuts -- it had no new advice Monday or a timeline for a fix.

However, Jerry Bryant, a general manager with the Microsoft Security Response Center (MSRC), said that the company would definitely patch the problem. "Some of the discussions we've seen in the last couple of days state that we are not going to provide an update for this issue," Bryant said in an e-mail reply to questions. "This is an issue that we will be providing a security update for."

But unless Microsoft makes a dramatic policy change -- and backtracks on statements it gave as recently as last month -- patches will not be issued for Windows XP Service Pack 2 (SP2), the edition that was retired from all support July 13.

And that will be a problem, said Moore. "Maybe the Zeroday patch guys will put something out for XP SP2," he said, referring to a group of researchers who have infrequently released unauthorized patches for Windows vulnerabilities before Microsoft wraps up its work.

The group, which goes by the name ZERT (Zeroday Emergency Response Team) last shipped a patch in April 2007.

Microsoft's next regularly-scheduled security updates are slated to ship Aug. 10. Microsoft does issue emergency updates at times, however. So far this year, the company has released two "out-of-band" updates, both for IE.

TimeFlip Magnet Simple Time Tracking Device

Naztech Xtra Drive Mini + 256GB microSD Card

Christmas Gift Guide

Brand Post

Office 365 Business Premium isn’t one-size fits all but if you’re the right sized business for it to make sense, there’s a good amount of value to be found in the package’s comprehensive software offering.

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited. Copyright 2013 IDG Communications.
ABN 14 001 592 650. All rights reserved.